Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Network Security Mid Term Exam Chapters 1 to 8/Questions and answers 2026

Beoordeling
-
Verkocht
-
Pagina's
32
Cijfer
A
Geüpload op
29-03-2026
Geschreven in
2025/2026

Network Security Mid Term Exam Chapters 1 to 8/Questions and answers 2026Network Security Mid Term Exam Chapters 1 to 8/Questions and answers 2026Network Security Mid Term Exam Chapters 1 to 8/Questions and answers 2026Network Security Mid Term Exam Chapters 1 to 8/Questions and answers 2026Network Security Mid Term Exam Chapters 1 to 8/Questions and answers 2026Network Security Mid Term Exam Chapters 1 to 8/Questions and answers 2026Network Security Mid Term Exam Chapters 1 to 8/Questions and answers 2026Network Security Mid Term Exam Chapters 1 to 8/Questions and answers 2026

Meer zien Lees minder
Instelling
Network Security
Vak
Network Security

Voorbeeld van de inhoud

Network Security Mid Term Exam Chapters 1 to
8/Ques ons and answers 2026

Each of the following is a reason why it is difficult to defend against today's a ackers except
_____.

a. speed of a acks
b. greater sophis ca on of a acks
c. complexity of a ack tools
d. delays in patching hardware and so ware products

C. Complexity of a ack tools.

In a general sense, "security" is _______.

a. protec on from only direct ac ons
b. using reverse a ack vectors (RAV) for protec on
c. only available on hardened computers and systems
d. the necessary steps to protect a person or property from harm

the necessary steps to protect a person or property from harm

_____ ensures that only authorized par es can view the informa on.

a. Availability
b. Integrity
c. Confiden ality
d. ICA

C. Confiden ality

Each of the following is a successive layer in which informa on security is achieved except
_______.

a. products
b. purposes
c. procedures
d. people

,b. Purposes

By defini on, a(n) _______ is a person or thing that has the power to carry out a threat.

threat agent

_______ensures that the individual is who they claim to be.

Authen ca on

Each of the following is a goal of informa on security except _____.

a. prevent data
b. decrease user produc vity
c. avoid legal consequences
d. foil cyberterrorism

B. Decrease user produc vity

The ______ requires that enterprises must guard protected health informa on and implement
policies and procedures to safeguard it.

Health Insurance Portability and Accountability Act (HIPAA)

U lity, telecommunica ons, and finanical services companies are considered prime targets of
_____ because a ackers can significantly disrupt business and personal ac vites by destroying a
few targets.

a. cyberterrorists
b. kiddie scripters
c. computer spies
d. blue hat hackers (BHH)

a. cyberterrorists

A er an a acker probed a computer or network for informa on she would next _____.

a. modify security se3ngs
b. penetrate any defenses
c. paralyze networks and devices
d. circulate to other systems

b. penetrate any defenses

,An organiza on that purchased security products from different vendors in case an a acker
circumvented the Brand A device, yet would have more difficulty trying to break through a
Brand B device because they are different, is an example of _____.

a. obscurity
b. layering
c. limi ng
d. diversity

D. Diversity

Each of the following can be classified as an "insider" except _______.

a. business partners
b. contractors
c. cybercriminals
d. employees

Cybercriminals

________ are a network of a ackers, iden ty thieves, and financial fraudsters.

Cybercriminals

Each of the following is a characteris c of cybercriminals except _____.

a. low mo va on
b. less risk-averse
c. be er funded
d. more tenacious

a. low mo va on

Each of the following is a characteris c of cybercrime except _____.

a. targeted a acks against financial networks.
b. unauthorized access to informa on
c. the of personal informa on
d. exclusive use of worms and viruses

D. Exclusive use of worms & viruses

, An example of a(n) _____ is a so ware defect in an opera ng system that allows an
unauthorized user to gain access to a computer without a password.

a. vulnerability
b. threat
c. threat agent
d. asset exploit (AE)

A. vulnerability

_____ requires banks and financial ins tu ons to alert customers of their policies & prac ces in
disclosing customer informa on & to protect all electronic & paper containing personally
iden fiable financial informa on

a. California Savings & Loan Security Act (CS&LSA)
b. USA Patriot Act
c. Sabanes-Oxley Act (Sarbox)
d. Gramm-Leach-Bliley Act (GLBA)

d. Gramm-Leach-Bliley Act (GLBA)

The term ____ is commonly used in a generic sense to iden fy anyone who illegally breaks into
a computer system.

a. hacker
b. cyberterrorist
c. Internet Exploiter
d. cyberrogue

a. hacker

An example of _____ would be not revealing the type of computer, opera ng system, so ware,
& network connec on a computer uses.

a. diversity
b. Iimi ng
c. obscurity
d. layering

c. obscurity

Geschreven voor

Instelling
Network Security
Vak
Network Security

Documentinformatie

Geüpload op
29 maart 2026
Aantal pagina's
32
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
STUVEX NURSING
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
803
Lid sinds
2 jaar
Aantal volgers
315
Documenten
16222
Laatst verkocht
1 dag geleden
STUVATE - STUVIA USA

My store is a comprehensive destination for buying and selling a variety of documents. we offer a vast range of documents that cater to different needs and requirements, our documents are well-researched, accurate, and of high quality, ensuring customer satisfaction. whether you are looking for legal documents, academic papers, business reports or miscellaneous documents we`ve got you covered.

3.8

124 beoordelingen

5
49
4
32
3
24
2
7
1
12

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen